[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[LCFC] templates://prey/{templates}



This is the last call for comments for the review of debconf
templates for prey.

The reviewed templates will be sent on Thursday, March 10, 2011 to the package
maintainer as a bug report and a mail will be sent to this list with
"[BTS]" as a subject tag.


-- 


Template: prey/reporting_frequency
Type: string
Default: 20
_Description: Frequency of Prey reports and actions (minutes):
 Please enter the time to wait before waking up Prey. Control Panel users can
 change this setting later through the web interface.

Template: prey/active_modules
Type: multiselect
Choices: ${choices}
Default: alarm
_Description: Modules to enable:
 Prey has many optional modules; if enabled they will be triggered
 automatically if prey recognizes that the device is stolen.
 .
  * alarm:   plays a loud sound for 30 seconds;
  * alert:   shows the thief a short message (and may change the
             wallpaper);
  * geo:     attempts to geolocate the device by using its internal
             GPS or the nearest WiFi access points as reference;
  * lock:    locks the device and asks for a password;
  * network: collects information about the Internet connection;
  * secure:  deletes browser cookies and stored passwords;
  * session: takes a screenshot, collects information about modified
             files and running programs;
  * webcam:  tries to take a picture using the webcam.

Template: prey/edit_config
Type: note
_Description: Configuration required
 To finish configuring Prey, you need to edit "/etc/prey/config" and
 choose its running mode. The options are:
 .
  * Control Panel: reports are sent to preyproject.com. Go to
                   http://control.preyproject.com/signup and create
                   an account, then set "apt_key" and "device_key"
                   appropriately in the configuration file.
  * Standalone:    reports are sent directly to the owner at a
                   specified mail or SSH (scp/sftp) server when
                   activated via a trigger URL under your control.
Source: prey
Section: utils
Priority: optional
Maintainer: Alessio Treglia <alessio@debian.org>
Build-Depends: debhelper (>= 7.0.50~),
 python (>= 2.5),
 python-support,
 po-debconf
Homepage: http://www.preyproject.com/
Standards-Version: 3.9.1
XS-Python-Version: >= 2.5
Vcs-Git: git://git.debian.org/git/collab-maint/prey.git
Vcs-Browser: http://git.debian.org/?p=collab-maint/prey.git

Package: prey
Architecture: all
Depends: openssl,
 imagemagick | scrot,
 bash (>= 4),
 curl,
 streamer,
 libio-socket-ssl-perl,
 libnet-ssleay-perl,
 ${perl:Depends},
 ${misc:Depends}
Recommends: python (>= 2.5),
 python-gtk2
Description: utility for tracking stolen computers
 Prey is a lightweight program to help track and recover a stolen laptop.
 .
 It comprises a shell script which calls out on a regular basis to
 either a server run by the Prey project, or a URL defined by the system
 administrator. A graphical configuration tool is also provided in
 order to maintain the simple config file.

Attachment: signature.asc
Description: Digital signature


Reply to: